Welcome![Sign In][Sign Up]
Location:
Search - des bmp

Search list

[Crack HackDES_BMP

Description: 利用DES算法(包括ECB和CBC模式)加解密BMP图像-using DES algorithm (including the ECB and the CBC mode) encryption BMP images
Platform: | Size: 301302 | Author: pouch | Hits:

[Crack HackDES-PIC-CBC

Description: DES加密方法加密BMP图像,CBC方式实现。
Platform: | Size: 87622 | Author: Rex | Hits:

[Crack HackDES-PIC-ECB

Description: DES加密方法加密BMP图像,ECBC方式实现。
Platform: | Size: 64841 | Author: Rex | Hits:

[File Operatedes-bmp

Description: 用DES对.bmp图像文件进行加密,而且带雪崩分析功能,程序结构清晰,使用方便。
Platform: | Size: 146131 | Author: caohan | Hits:

[Crack Hackdes

Description: 利用des算法实现BMP的加解密 ,并能够成功的对于图象使用CRC加密,并有雪崩和线形分析
Platform: | Size: 1628396 | Author: qq11420 | Hits:

[Crack HackDES_BMP

Description: 利用DES算法(包括ECB和CBC模式)加解密BMP图像-using DES algorithm (including the ECB and the CBC mode) encryption BMP images
Platform: | Size: 301056 | Author: pouch | Hits:

[Crack HackDES-PIC-CBC

Description: DES加密方法加密BMP图像,CBC方式实现。-DES encryption methods encryption BMP image, CBC way.
Platform: | Size: 88064 | Author: Rex | Hits:

[Crack HackDES-PIC-ECB

Description: DES加密方法加密BMP图像,ECBC方式实现。-DES encryption BMP image encryption method, ECBC way.
Platform: | Size: 64512 | Author: Rex | Hits:

[File Operatedes-bmp

Description: 用DES对.bmp图像文件进行加密,而且带雪崩分析功能,程序结构清晰,使用方便。-By DES on. Bmp image files encrypted, but with the avalanche analysis, program structure clear and easy to use.
Platform: | Size: 1233920 | Author: | Hits:

[Crack Hackdes

Description: 利用des算法实现BMP的加解密 ,并能够成功的对于图象使用CRC加密,并有雪崩和线形分析-BMP use des algorithm of encryption and decryption, and the success of the use of CRC for the image encryption, and avalanches and linear analysis
Platform: | Size: 2387968 | Author: qq11420 | Hits:

[Special EffectsKmeans

Description: 标准C++/C处理BMP图像,没有使用VC中的BITMAP类及任何不在ANSI-C中的结构和函数。采用了k_means压缩算法处理24bit(可以更改源码使之支持8-bit,16-bit和灰度bmp)源码注释详细,其中对BMP文件BMPHEADINFO的处理比较有趣。 new.cpp---->主要的程序代码 *.h----->一个产生U(0,1)随机数的发生器,相合度较小,DES函数产生。-Standard C++/C handle BMP images, do not use the VC in the category and any BITMAP not ANSI-C in the structure and function. K_means compression algorithm used to deal with 24bit (you can change the source code to support the 8-bit ,16-bit and grayscale bmp) detailed source notes, in which the handling of BMP files BMPHEADINFO more interesting. new.cpp----> the main program code*. h-----> generate a U (0,1) random number generator, a smaller degree of consistency, DES Function Generator.
Platform: | Size: 4096 | Author: Yifan Young | Hits:

[Crack HackDES

Description: DES加密的标准且完整的实现,可以对bmp图片进行加密。-DES encryption standard and complete implementation of the bmp images can be encrypted.
Platform: | Size: 61440 | Author: 葛瑞海 | Hits:

[Crack Hackmain

Description: DES加密算法 实现了bmp图片加密 采用的是最简单的CBC模式-DES encryption algorithm used in the bmp image encryption CBC mode is the simplest
Platform: | Size: 4096 | Author: 钟洪盛 | Hits:

[Crack HackDES

Description: 该资源利用DES算法针对BMP格式的位图进行加密和解密,对初学者应该有很大的借鉴意义-The DES algorithm for resource use bitmap BMP format encryption and decryption, for beginners should have major implications ~ ~
Platform: | Size: 229376 | Author: 叶枫 | Hits:

[Crack HackDES_tuxiang

Description: 一个采用DES加密算法对bmp格式图像进行加密和解密的软件-DES encryption algorithm using a bmp format image encryption and decryption software
Platform: | Size: 550912 | Author: 刘银 | Hits:

[Crack Hackdes

Description: 编写 C 程序实现 DES 加、解密: (1) 编程实现 基于自己的名字来构造一 DES 密钥; (2) 应用 (1) 获得的密钥将一副灰度 图 (BMP 格式 ) 进行加、解 密; (3) 应用 ECB 和 CBC 两种操作模式分别完成-C program to prepare DES Encryption and Decryption: (1) programming based on their names to construct a DES key (2) applications (1) to obtain the key to a grayscale (BMP format) to increase, decryption (3) Application of ECB and CBC mode of operation, respectively, the completion of two (2)
Platform: | Size: 265216 | Author: yangfeng | Hits:

[Crack Hackdesjiami

Description: 使用DES算法对BMP文件进行加密解密,使用visual studio-BMP files using DES algorithm for encryption and decryption, using visual studio
Platform: | Size: 4096 | Author: renjing | Hits:

[Crack HackSymmetric-key-cryptography

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程; -Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 45056 | Author: 丁元元 | Hits:

[Crack HackRSA-Symmetric-key

Description: 完成基于非对称密码技术的对称密钥分配工作 说明: (1)在完成上述基于公钥证书的非对称密钥分配工作的基础上,根据教材上基于非对称密码技术的对称密钥分配方案,完成对称密钥Ks的分配工作。 (2)A用Ks对一图象文件(test_pic.bmp)进行加密并发送给B,B收到后解密,对比原图象看是否一致,并记录整个加密/解密的所用时间T2; (3)对比T1和T2; 要求: (1)JAVA语言编程实现,基于RSA完成非对称密码技术的加/解密,基于DES完成对称密码技术的加/解密(JAVA有库函数支持); (2)通信内容为一图象文件(test_pic.bmp); (3)基于网络完成密钥分配工作(作为通信的双方A、B应部署于两台主机上); (4)所分配的对称密钥皆为一次一密,随机产生; (5)具体密钥分配过程请以课本中基于非对称密码技术的对称密钥分配方案为参考,完成从步骤1到步骤4的全过程;-Completed based on asymmetric cryptography symmetric key distribution work Description: ( 1 ) Upon completion of the above-mentioned asymmetric public key certificate-based key distribution based on the work , according to the materials on asymmetric cryptography-based symmetric key distribution scheme , the completion of the distribution of symmetric key Ks work . (2) A use of an image file Ks (test_pic.bmp) is encrypted and sent to B, B to decrypt after receipt , compared to see if the same original image , and records the encryption/decryption used time T2 ( 3 ) comparing T1 and T2 Requirements: (1) JAVA programming language, based on the RSA asymmetric cryptographic techniques to complete encryption/decryption , based on the DES symmetric cryptographic techniques to complete the encryption/decryption (JAVA library functions are supported ) ( 2) The content of the communication is an image file (test_pic.bmp) ( 3 ) complete network-based key distribution job ( as the
Platform: | Size: 15360 | Author: 丁元元 | Hits:

[Crack HackDES

Description: 密码学原理实现DES对bmp灰度图的加解密-Realization of the principle of cryptography DES encryption and decryption for grayscale bmp
Platform: | Size: 1213440 | Author: liu fei | Hits:

CodeBus www.codebus.net